Presentation is loading. Please wait.

Presentation is loading. Please wait.

UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking.

Similar presentations


Presentation on theme: "UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking."— Presentation transcript:

1 UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking

2 UNCLASSIFIED OPSEC and Social Networking Naval OPSEC Support Team (NOST) Navy Information Operations Command (NIOC) (757) 417-7100 DSN 537 OPSEC@navy.mil www.facebook.com/NavalOPSEC www.twitter.com/NavalOPSEC www.slideshare.net/NavalOPSEC

3 UNCLASSIFIED OPSEC is a process that identifies critical information, outlines potential threats and risks and develops counter measures to safeguard critical information Operations Security OPSEC

4 UNCLASSIFIED Information the adversary needs to prevent our success. Critical Information Information we must protect to ensure success. - Names and photos of you, your family and co-workers - Usernames, passwords, network details - Job title, location, salary, clearances - Physical security and logistics - Position, mission capabilities and limitations - Operations & missions - Schedules and travel itineraries - Social security number, credit cards, banking information - Hobbies, likes, dislikes, etc.

5 UNCLASSIFIED Data Aggregation Information collection from multiple sources Al Qaeda handbook: open and legal public sources accounts for 80% of all information collected Legal and illegal collection methods

6 UNCLASSIFIED Methods used to obtain Critical Information: Unprotected communications Sharing too much with strangers HUMINT Observations Technology Trash Media Email Web pages Social Networking Sites Potential Vulnerabilities Illegal methods are OK with adversaries!!!

7 UNCLASSIFIED Social Networking Social Networking Sites (SNS) allow people to network, interact and collaborate to share information, data and ideas without geographic boundaries.

8 UNCLASSIFIED The Danger Al-Qaeda communiqué December 2009: “The affair with the U.S. Navy began several years ago, when the lions of Al-Qaeda struck the destroyer U.S.S. Cole, in Yemen; now, with Allah’s help, all the American vessels in the seas and oceans, including aircraft carriers, submarines, and all naval military equipment deployed here and there that is within range of Al-Qaeda’s fire, will be destroyed… “To this end, information on every U.S. naval unit – and only U.S. [units]!! – should be quietly gathered [as follows:] [the vessel's] name, the missions it is assigned; its current location, including notation of the spot in accordance with international maritime standards; the advantages of this naval unit; the number of U.S. troops on board, including if possible their ranks, and what state they are from, their family situation, and where their family members (wife and children) live; what kind of weapons they carry; the [vessel's] destination…; which naval units are closest to Islamic countries; which naval units are close to Western countries in general; searching all naval websites in order to gather as much information as possible, and translating it into Arabic; search for the easiest ways of striking these ships… “My Muslim brothers, do not underestimate the importance of any piece of information, as simple as it may seem; the mujahedeen, the lions of monotheism, may be able to use it in ways that have not occurred to you.” …. Do not underestimate the importance of any piece of information, as simple as it may seem…. Information on every U.S. Naval unit should be quietly gathered…what state they are from, their family situation, and where their family members live… …search for the easiest ways of striking these ships…

9 UNCLASSIFIED DO’S & DON’TS of SOCIAL NETWORKING

10 UNCLASSIFIED “Do” Do: Verify All Friend Requests Social engineering and “conning” starts with a friend request Adversaries can get the data from: Free people search engines Other SNS’s Your posts/profile Your friends posts/profile Verify Requests Before Approving! Adversary

11 UNCLASSIFIED Avoid details, don’t get personal Who is reading your blog? Lessons learned 101 for the adversary “Do” Do: Blog with Caution

12 UNCLASSIFIED “Do” Do: Be an Informed User of a SNS How much personal information do you broadcast? Are you very careful about what details you post? Do you understand data aggregation issues? Are you willing to find and learn all the security settings and keep up with them as they change? Are you willing to accept the risk?

13 UNCLASSIFIED “Do” Do: Assume the Internet is FOREVER There is no true delete on the internet WWW means World Wide Web Every Picture Every Post Every Detail

14 UNCLASSIFIED “Don’t” Don’t: Discuss Details Never post anything you would not tell directly to the enemy Never post private or personal information - no matter how secure you think your settings are Assume the information you share will be made public Details make you vulnerable

15 UNCLASSIFIED “Don’t” Do NOT post exact deployment dates –Avoid the use of count-up or count-down tickers Don’t speculate about future operations If posting pictures, don’t post anything that could be misconstrued or used for propaganda purposes Do not pass on rumors

16 UNCLASSIFIED “Do NOT discuss ” Flight routes, flight schedules Detailed information on the mission, capabilities or morale of a unit Do not post deployment locations or detachment sites – After the deployment is officially announced by Military officials, you may discuss locations that have been released, normally on the Country level Security procedures, response times, tactics Equipment or lack thereof, to include training equipment

17 UNCLASSIFIEDQuestions? www.facebook.com/NavalOPSEC www.twitter.com/NavalOPSEC


Download ppt "UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking."

Similar presentations


Ads by Google